From mcp-security-review
Performs pre-coding security assessments for development tasks, detecting technologies, assessing risk levels, identifying categories, and providing OWASP guidance before coding.
npx claudepluginhub srajangpt1/ai-security-crewThis skill uses the workspace's default tool permissions.
Perform a pre-coding security review for the following task:
Provides elite appsec expertise for secure SDLC, OWASP Top 10 2025, STRIDE threat modeling, SAST/DAST/SCA integration, vuln remediation, cryptography, auth patterns, and DevSecOps automation. Use for securing apps, controls, assessments.
Audits code security using STRIDE threat modeling, attack trees, CVSS severity ranking, OWASP patterns, and CWE analysis for vulnerabilities in auth, inputs, crypto, and dependencies.
Provides OWASP Top 10 guidelines, secure Python/Flask coding patterns, prevention strategies, and remediation for access control and cryptographic vulnerabilities.
Share bugs, ideas, or general feedback.
Perform a pre-coding security review for the following task:
$ARGUMENTS
Analyze the task description above and produce a structured security assessment. If no task description was provided in the arguments, ask the user to describe what they are building and optionally their tech stack before proceeding.
Detect technologies from the description:
Critical — payments/financial transactions, healthcare/PHI, authentication system, cryptographic key management, admin functionality, multi-tenant data isolation
High — PII collection/storage, file uploads, external API integrations, session management, password handling, OAuth flows, database schema changes
Medium — user-generated content, search functionality, data exports, email/notification systems, third-party SDKs, internal APIs
Low — static content, read-only public data, internal tooling with no sensitive data
Select all applicable:
authentication — login, registration, password reset, MFAauthorization — access control, roles, permissions, IDORdata_validation — input validation, sanitization, output encodingcryptography — encryption, hashing, key management, TLSapi_security — endpoints, rate limiting, CORS, versioningweb_security — XSS, CSRF, clickjacking, CSPdatabase — SQL injection, ORM, connection securitysecrets_management — credentials, env vars, vaultserror_handling — information disclosure, stack traceslogging — audit trails, sensitive data in logscloud_security — IAM, S3 permissions, VPC, security groupssupply_chain_security — dependencies, lockfilesFor each identified category, provide specific, actionable guidance:
Authentication: Use bcrypt/argon2 for passwords; implement account lockout; secure HttpOnly SameSite cookies; rotate session tokens after login; enforce MFA for high-privilege actions.
Authorization: Validate permissions server-side on every request; deny-by-default; avoid direct object references; check ownership before granting access.
Data Validation: Validate and sanitize ALL user input server-side; use allowlists not denylists; encode output based on context (HTML, JS, SQL, URL); validate file uploads by type, size, and content.
Cryptography: AES-256-GCM or ChaCha20-Poly1305 for encryption; SHA-256+ for hashing (never MD5/SHA1 for security); cryptographically secure random for tokens; never hardcode keys.
API Security: Authenticate all sensitive endpoints; rate limit per user and per IP; validate Content-Type; return generic error messages (no stack traces in production); HTTPS + HSTS.
Injection Prevention: Parameterized queries/prepared statements for SQL; avoid eval()/exec() with user input; subprocess with shell=False (Python); sanitize data in OS commands, LDAP, XML, HTML.
Secrets Management: Never commit secrets to git; use environment variables or secrets manager (Vault, AWS SSM); rotate credentials regularly; scan commits for accidental exposure.
Produce this exact structure:
Task: [task description] Risk Level: [LOW | MEDIUM | HIGH | CRITICAL] Tech Stack Detected: [list or "not specified"] Security Categories: [comma-separated list]
[2–3 sentences explaining why this risk level was assigned and what the primary security concerns are for this specific task]
For each identified category:
Copy this into your prompt when asking an AI to generate code for this task:
SECURITY REQUIREMENTS — apply throughout all generated code:
Risk Level: [RISK LEVEL]
[Bulleted list of the top 5–7 security requirements written as direct instructions to an AI code generator, specific to this task]